Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Redundant key server encryption environment

a key server and encryption environment technology, applied in the field of computer program products, systems and methods, can solve problems such as customer inability to access encrypted data on encrypted storage, key servers may not be able to complete initial program load (ipl) and become operational, and key servers may not be able to provide key services

Inactive Publication Date: 2011-10-27
IBM CORP
View PDF6 Cites 51 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

An encryption deadlock situation may occur when all key servers within a computing environment are rendered inoperable because key server data is stored on an encryption storage device that is dependent on the key server to access the data (i.e., the encryption keys themselves have been included within the data that was encrypted using those keys).
If an encryption deadlock occurs, then the key servers may not be able to complete their initial program load (IPL) and become operational or may not be able to provide key services to storage subsystems.
While an encryption deadlock exists, the customer is unable to access any encrypted data on the encrypted storage.
If the possible key server instances are in encryption deadlock, then the customer cannot obtain the keys needed to decrypt attached storage, and the encryption deadlock can become a permanent encryption deadlock such that all encrypted data managed by the key servers is permanently lost, which can have substantially detrimental effects to the business whose data is now inaccessible.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Redundant key server encryption environment
  • Redundant key server encryption environment
  • Redundant key server encryption environment

Examples

Experimental program
Comparison scheme
Effect test

embodiment details

Additional Embodiment Details

[0050]The described operations may be implemented as a method, apparatus or computer program product using standard programming and / or engineering techniques to produce software, firmware, hardware, or any combination thereof. Accordingly, aspects of the embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,”“module” or “system.” Furthermore, aspects of the embodiments may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.

[0051]Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Provided are a computer program product, system and method for a redundant key server encryption environment. A key server transmits public keys associated with the key server and at least one device to at least one remote key server. The key server receives from the at least one remote key server public keys associated with the at least one remote key server. The key server receives a request for an encryption key from a requesting device comprising one of the at least one device and generates the encryption key for use by the requesting device to unlock a storage. The key server generates a first wrapped encryption key by encrypting the encryption key with a requesting device public key associated with the requesting device. The key server generates a second wrapped encryption key by encrypting the encryption key with a public key associated with the key server. At least one additional wrapped encryption key is generated for each of the at least one remote key server by encrypting the encryption key with the at least one public key provided by the at least one remote key server. The key server transmits the first, second and the at least one additional wrapped encryption key to the requesting device.

Description

BACKGROUND OF THE INVENTION[0001]1. Field of the Invention[0002]The present invention relates to a computer program product, system and method for a redundant key server encryption environment.[0003]2. Description of the Related Art[0004]In certain encryption environments, storage subsystems may request a symmetric key from a key server and then use that symmetric key to unlock a disk drive or use the symmetric key to encrypt and decrypt data to tape. Using a graphical interface or command line, the customer first configures the key server with an asymmetric key pair and an associated key label comprising text. The customer may then enter in a key label comprising text using a graphical interface or command line as input to an encryption group create operation on the storage device. In response to a request from the subsystem for the symmetric key that is part of the encryption group create command, the key server generates the encryption key and provides the storage subsystem the e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/00
CPCH04L9/083H04L9/0825
Inventor KAHLER, DAVID RAYMATHUR, ANJULRIPBERGER, RICHARD ANTHONYSHEPPARD, JACOB LEEJAQUETTE, GLEN ALAN
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products